Big Bytes

What is privacy trading business model & difference between so-called ethical and unethical hacking?

The Mr. Cools selling information security services call it ethical and those hack with utter rudeness are labeled unethical. Both work for some goals – personal vandetta, capital gains or sponsored by cronies looking to encash the overall vulnerability and create business oppurtunities out of it. Much like mudering someone either for a supari or for saisfying greed of a cozy selfie army. Like other hyped menaces, hacking correctness is a doctrine fostered by a delusional, illogical minority, and promoted by unscrupulous cronies within mainstream technology world which holds forth the proposition that it is entirely possible to pick up a hacker turd by the clean end.

As hackers started making money, the field is becoming full of humming professionals that inspire organized cyber crime, buying top legal support. Taking clues from their corporate, political and social masters, hackers have already developed their own business models in order to operate as a profitable organization. What do these business models look like? More data, more money. So the attack logic is simple: the more attacks, the more likely victim – so you automate. But interesting variations keeps emerging e.g. hackers do buy or steal white data from social media privacy traders like Fakebooks, Goolies, Flippers, Snapers, AamAsses etc.. and bang innocent navie users with deception via selfie updates, emails or even direct mobile calls. This is also called win-win strategic partnership, done mostly in cool backdoor intellect encounters!

An example: A master hacker or the great cronie writes a phishing toolkit (an app, website or some innovative stuff) for other worker hackers to use. The proxy hackers download the kit, chose a phishing site or mobile app using a simple GUI dashboard and, just like that, the proxy hackers were good to go. The popularity of the kit soar, since, as opposed to traditional phishing setups where hackers are required to set up and allocate storage for the data collection, this kit offer to remove that back-office work from the proxy hacker. The master hacker provide with his kit cloud storage for the fraudulently obtained credentials. The credentials, once retrieved, would go to the cloud storage and reside in a location allocated only for the single proxy hacker. Controls were set such that one proxy hacker could not access the allocation area of another proxy hacker.

The proxy hackers could continue with their attacks without ever worrying about being cheated out by a fellow hacker. But this kit had a twist: although access to the credentials storage was secured from the eyes of fellow proxy hackers, this was not the case with the master hacker. A backdoor on the storage system allowed the viewing of all these credentials by the master hacker who wrote the kit. In reality then, all the proxy hackers were each gathering the credentials for the master hacker!

Now consider the scenario – assume each proxy hacker gains a dozen credentials. And a thousand hackers have downloaded the kit – that’s already over 10K worth of valuable data without the master hacker ever needing to dirty his hands with the actual target! In fact, the master hacker boasted some 200K downloads. This number may surely be exaggerated, but the point is clear – it is widely in use. In India, it’s also done via innovative network marketing, online!

Like any so-called successful loot driven business of winners, it is not enough to just advertise. To really penetrate the market, you need to show you know your stuff. Hackers are even using organized cum hyped social media as a channel to promote their skills, no wonder if they’re using other popular media. As traditional mafia or terror activities gets less lucrative, tutorials on hacks are getting common, and the tech biggies love it anyway as it creates new prospects to counter-sell their anti-hacking kits. A new nursery rhyme “hacker, hacker, the uncle rule breaker – hacker, hacker, the great quick money maker, thou privacy trader!”.

Sudhir Panda

No bhakt of any popular gangs, an irrepressible autodidact, pure blunt+ ideas on politics, economics, technology, culture, etc, do not fit any known ideologies. Tweets at

Leave a Reply

You may also like:

Corruption Entertainment Law / Legal Lifestyle People Software Technology Telecom

Beware of Mobile Malware / Spyware behind those fancy apps / gadgets!

Corporate governments, security experts and officials remain in support of mass, warrant-less surveillance. But civil libertarians, humane technology companies and others oppose it, noting obvious lack of transparency and espionage to save crooks / cronies. As a cheap smartphone user, you don’t have to worry for Malware / Spyware / Virus, just buy antidotes. You […]

Read More
Corruption Law / Legal Lifestyle Software Startup Technology Telecom

FAANG & Co force-feeding ads & sermons based on big data theft via mobile apps

Chanakya’s political parties were abusing social media marketing for bumper votes and sponsored branding, now the same so-called tech innovation balloons are haunting and fighting back for long-term continuity and its ROI capitalism. Ironic all-round abuse of 99% social slaves

Read More
Health Lifestyle Media / PR People Technology

Coronavirus threat – safety first!

We believe this is a moment to use all of our creative people power to fight for a just, people-centered transition away from the systems behind these crises we face. This is not the moment to protest in the streets, nor the time to gather in-person in large groups for actions and mobilizations.

Read More